otsmr / internet-of-vulnerable-thingsView external linksLinks
The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.
☆19Jan 20, 2023Updated 3 years ago
Alternatives and similar repositories for internet-of-vulnerable-things
Users that are interested in internet-of-vulnerable-things are comparing it to the libraries listed below
Sorting:
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated 2 weeks ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Apr 24, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Source code for my personal blog, powered by Zola. Moved to https://git.notthebe.ee/notthebee/notthebe.ee☆19Dec 29, 2025Updated last month
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Mar 8, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- Proxy-Generator V1☆18Aug 5, 2018Updated 7 years ago
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated last year
- ☆24Feb 14, 2024Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 2 months ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆48Sep 30, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- The Ukr-Books-ChatGPT-Plugin is a Python-based plugin designed to enhance the capabilities of OpenAI's ChatGPT model by integrating it wi…☆19Jul 21, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Jan 21, 2026Updated 3 weeks ago
- ☆28Mar 31, 2023Updated 2 years ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- The HPE Alletra 9000 and Primera and 3PAR PowerShell Toolkit supports cmdlets, which are wrappers around the native HPE Alletra 9000 or H…☆12Dec 21, 2022Updated 3 years ago
- ☆34Apr 24, 2024Updated last year
- Modern open source login forms with clean HTM, CSS, JS and no dependencies☆34Aug 5, 2025Updated 6 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Mar 9, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- Create VCF file from exported Telegram data☆11May 21, 2019Updated 6 years ago